Still Not Cracked: a further dive into the PKCS #1 v1.5 vulnerability

Contrary to some comments we have seen, RSA is not “walking around” the Project Team Prosecco research as is asserted in a recent Root Labs blog; in fact we have repeatedly stated to bloggers and the press that we support this specific research (as I did here, yesterday) as well as other cryptanalysis.  Our problem…

The Threat of the Threat Itself

Some colleagues and I were discussing DDoS attacks earlier this week: who is waging DDoS attacks, what techniques they’re using and how to deal with attacks when they occur.  While discussing the value of advance warning of such attacks, one person said offhandedly, “the problem with advance warning is that the threat may be just…

Premature Counter Offensive Actions Could Yield Painful Results

Who’s Advocating Counter Offensive and Why? Recently there has been a flurry of activity and discussion related to the concept of counter offensive measures being launched by private sector organizations in response to some form of targeted attack (criminal, industrial espionage-driven, state sponsored etc.).   Counter Offensive (CO) operations are not new; however, in the context…

Detecting Mobile Malware

A couple of weeks ago, my colleague Alina Oprea and I participated in the ZISC Workshop on Secure Mobile and Cloud Computing 2012 sponsored by the ETH here in Zürich. The second day of the workshop focused on cloud security, ending with Alina’s great presentation on research that RSA Labs is doing on mechanisms that…

Privacy and Public Spaces

One of the great things about traveling is the interesting folks you meet. That’s true not only in meetings and conferences and such, but also on the plane. I’ve had fascinating conversations many times with the people sitting next to me — sometimes about computer security, as when the director of consulting at Verisign and…

Life Grabbers and LinkedIn Passwords

The recent LinkedIn accounts compromise in which 6.5 million password hashes were published in the Russian hacker community grabbed a lot of media attention. In a hellish period of publicly known breaches that hit the front page news, with perimeter security defenses failing left and right in any possible vertical and geography, this incident stirs…

Neighbourhood Watch Schemes

In a recent SBIC report one of the recommendations for protecting against Advanced Threats was to ‘participate in information exchange’.  Defending against advanced threats will require new models for information sharing.  Historically organizations have been reluctant to share threat information but it is becoming increasingly vital that organizations share information and more importantly share it…

Big Brother watching YOU – Is it ethical?

To follow on from my recent blog on social media and security I had an opportunity to speak at the Governance, Risk and Ethics Forum in Ireland recently. Ethics and social media bring up and interesting discussion. Is it legal to watch what your employees are doing on social media? Is it ethical? Is it…

Social Networking and Security – Back to Basics

In the corporate environment social media has come a long way in a very short period of time. Initially, organizations were wary of the security risks — to use the famous Donald Rumsfeld quote of ‘we don’t know what we don’t know’ and organizations simply didn’t recognize the risks. In a totally reactive way some…

ECAT webinar June 19th 11AM EDT

“Old wine in a new bottle: Why new variants of old malware keep slipping through.” Flamer, Stuxnet and Duqu aren’t the only threats that slip past AV. Join us on June 19th at 11AM EDT for a live walkthrough of ECAT where we show how ECAT detects compromise that AV missed in an infected endpoint. We’ll…